Live and trustworthy forensic analysis of commodity production systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
PIGA-Virt: an advanced distributed MAC protection of virtual systems
Euro-Par'11 Proceedings of the 2011 international conference on Parallel Processing - Volume 2
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
VMM detection using privilege rings and benchmark execution times
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others